Login
Download
Skill UI
Browse and discover
7039+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
remote
, found
23
results
Default
Newest
Most Downloaded
Deploy Zscaler Private Access
configuring-zscaler-private-access-for-ztna
mukul975/Anthropic-Cybersecurity-Skills
380
Guides deploying Zscaler Private Access to replace VPNs with zero-trust access, covering App Connector installs, internal app segmentation, identity- and posture-based access policies, and device posture enforcement for secure remote access.
View Details
Prisma Access Zero Trust
deploying-palo-alto-prisma-access-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
306
Step-by-step guidance for deploying Palo Alto Networks Prisma Access to deliver SASE zero trust access via GlobalProtect agents, ZTNA Connectors, granular security policies, and Strata Cloud Manager orchestration for remote and branch users.
View Details
Insecure Deserialization Exploits
exploiting-insecure-deserialization
mukul975/Anthropic-Cybersecurity-Skills
113
Guide to spotting serialized payloads (cookies, APIs, ViewState) and weaponizing Java, PHP, Python, and .NET gadget chains to prove remote code execution during authorized penetration tests.
View Details
Prototype Pollution Attack Guide
exploiting-prototype-pollution-in-javascript
mukul975/Anthropic-Cybersecurity-Skills
427
A step-by-step playbook for spotting and abusing JavaScript prototype pollution in both browsers and Node.js services to trigger DOM XSS, remote code execution, and authorization bypasses during security hunts and code reviews.
View Details
Template Injection Exploitation Guide
exploiting-template-injection-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
136
Step-by-step reference for detecting and exploiting server-side template injection (SSTI), covering injection point discovery, template engine fingerprinting, and payloads for Jinja2/Twig/Freemarker so authorized penetration tests can reach remote code execution.
View Details
Process Injection Hunting
hunting-for-process-injection-techniques
mukul975/Anthropic-Cybersecurity-Skills
221
Hunts MITRE ATT&CK T1055 process-injection techniques via Sysmon Event IDs 8/10 and EDR telemetry, parsing JSON logs to flag CreateRemoteThread calls, risky access masks, and reporting severity with mitigation guidance.
View Details
Zero Trust Browser Isolation
implementing-browser-isolation-for-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
103
Implements remote browser isolation with URL risk scoring, isolation policies, content disarming/reconstruction, DLP controls, and Secure Web Gateway plus ZTNA integration to harden web browsing against exploits and credential theft.
View Details
Tmux Terminal Multiplexing
tmux
sickn33/antigravity-awesome-skills
162
Expert tmux session, window, and pane management for remote terminal multiplexing, keeping long-running jobs alive and orchestrating scripted layouts across SSH sessions.
View Details
Security Bounty Hunting Guide
security-bounty-hunter
affaan-m/everything-claude-code
160
Practical workflow for finding exploitable, remotely reachable vulnerabilities, prioritizing those that qualify for bounties by confirming user-controlled attack paths, minimal PoCs, and real impact before reporting.
View Details
Firebase Remote Config
firebase-remote-config
evanca/flutter-ai-rules
132
Guides integrating Firebase Remote Config into Flutter apps, covering setup, defaults, fetching, real-time updates, throttling, and testing so you can adjust behavior dynamically without redeploying.
View Details
Explicit CDP Browser Control
browser-cdp
agentscope-ai/QwenPaw
446
Guides agents to attach to existing Chrome instances via CDP, scan local ports, or expose a fixed endpoint for sharing when explicit remote debugging is requested, while highlighting privacy precautions and workspace limits.
View Details
Prev
1
2
Language
简体中文
English